General

  • Target

    14022025_0146_13022025_Opcindecompra.ace

  • Size

    732KB

  • Sample

    250214-ccenwsyrht

  • MD5

    beb8a2a58c7749bb1f89b5fad87c450e

  • SHA1

    16cfbaa308feb2dad2dbc774e631408fce9394df

  • SHA256

    0e6a72fd296388a146aeb316e0e91031b7f67969dd877830bcae6c9133590f20

  • SHA512

    2ea92adb51211285651be6ad05291eb4a8b2ea37515367c900b535286377801850330aaa364c9fdf9f67803499c1778ee025f275b47c2d0ea53342875c0ccfac

  • SSDEEP

    12288:N/rz0VKmPqeqCZrvyI4Ghdy18zwmkSL1wLhhMOyKBKZqBLHYFGXCWF+DHN4if93i:NfsPq7CZr6Q8aDchMOyCuqhyoCg+Dico

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7490462916:AAEz89H3J9AylfxjXRLV5diILDx9KkgRSME/sendMessage?chat_id=7160883909

Targets

    • Target

      maharashtri.exe

    • Size

      746KB

    • MD5

      7cb23ee1dedd35c01d1cf539667d4d99

    • SHA1

      70f8e5fd9d4a78c78eb38e87c5482c763844a6e1

    • SHA256

      6db4fae76289918ad6c528e7d4d8e36484c2694b6e41775b0a3ccc2499f1b1da

    • SHA512

      df427d412bf8dc224b3c3b83b96a77f7462da670982d75c4c85762b89c97986a934e7b06552d9a4544e1f3ef60e5a743219e49637e41730e6e594f12ce09017d

    • SSDEEP

      12288:OF9OaIXbkkyjCZc0QIwy38SeD83S1dijjXMo3VFjGxnE8UML789zUO9vVOI0emBx:KOaeg3jCZcj+3lRsIj8o3XGxnlGUOdbE

    • Guloader family

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      $PLUGINSDIR/System.dll

    • Size

      11KB

    • MD5

      cf85183b87314359488b850f9e97a698

    • SHA1

      6b6c790037eec7ebea4d05590359cb4473f19aea

    • SHA256

      3b6a5cb2a3c091814fce297c04fb677f72732fb21615102c62a195fdc2e7dfac

    • SHA512

      fe484b3fc89aeed3a6b71b90b90ea11a787697e56be3077154b6ddc2646850f6c38589ed422ff792e391638a80a778d33f22e891e76b5d65896c6fb4696a2c3b

    • SSDEEP

      96:3IsUxO9udx4qYp7AJb76BykUbQMtHUOA5Iv+RnsrqeXV+d1g2IW9t2c+cEwF9oug:YVL7ikJb76BQUoUm+RnyXVYO2RvHoug

    Score
    8/10
    • Downloads MZ/PE file

MITRE ATT&CK Enterprise v15

Tasks